Method and device for managing WPI cipher key in 802.11 chips
A key and chip technology, applied in the field of managing WPI keys in 802.11 chips, can solve problems such as occupying a large storage space, achieve efficient acquisition, realize pipeline processing, and reduce the effect of on-chip cache
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0064] Specific implementation plan
[0065] Please refer to Figure 2, which describes the structure of an 802.11 MAC system that implements WPI functions.
[0066] The components of the 802.11 MAC system with WPI function include: an 802.11 MAC hardware responsible for implementing the 802.11 MAC protocol; an off-chip memory for storing data. In the present invention, a unicast key table and a multicast key table Store here. In the 802.11 MAC device, it contains a WPI-related register group for realizing WPI key storage and state storage; it contains a WPI encryption and decryption module for WPI encryption and decryption; it contains an 802.11 protocol module for processing protocols; It also contains some other modules.
[0067] The unicast key table, the multicast key table, the WPI related register group, the member index table on the IO interface and the key table base address together constitute the WPI key management module.
[0068] Please refer to Figure 3, which describ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap